default search action
SAI 2020: London, UK
- Kohei Arai, Supriya Kapoor, Rahul Bhatia:
Intelligent Computing - Proceedings of the 2020 Computing Conference, Volume 3. Advances in Intelligent Systems and Computing 1230, Springer 2020, ISBN 978-3-030-52242-1 - Kálmán Szentannai, Jalal Al-Afandi, András Horváth:
Preventing Neural Network Weight Stealing via Network Obfuscation. 1-11 - Raheleh Jafari, Sina Razvarz, Alexander E. Gegov:
Applications of Z-Numbers and Neural Networks in Engineering. 12-25 - Jan Sher Khan, Ahsen Tahir, Jawad Ahmad, Syed Aziz Shah, Qammer H. Abbasi, Gordon Russell, William J. Buchanan:
5G-FOG: Freezing of Gait Identification in Multi-class Softmax Neural Network Exploiting 5G Spectrum. 26-36 - Leon René Sütfeld, Flemming Brieger, Holger Finger, Sonja Füllhase, Gordon Pipa:
Adaptive Blending Units: Trainable Activation Functions for Deep Neural Networks. 37-50 - Mahmoud Zaki Iskandarani:
Application of Neural Networks to Characterization of Chemical Sensors. 51-60 - Owolafe Otasowie:
Application of Machine Learning in Deception Detection. 61-76 - Hossein Bonakdari, Bahram Gharabaghi, Isa Ebtehaj, Ali Sharifi:
A New Approach to Estimate the Discharge Coefficient in Sharp-Crested Rectangular Side Orifices Using Gene Expression Programming. 77-96 - Sandra Mae W. Famador, Tardi Tjahjadi:
DiaTTroD: A Logical Agent Diagnostic Test for Tropical Diseases. 97-115 - Abduljalil Mohamed, Amer Mohamed, Yasir Mustafa:
A Weighted Combination Method of Multiple K-Nearest Neighbor Classifiers for EEG-Based Cognitive Task Classification. 116-131 - Abdelfettah Miraoui, Lotfi Merad Sidi, Mohamed Meriah:
Detection and Localization of Breast Tumor in 2D Using Microwave Imaging. 132-141 - Osama Abuomar, Folly Patterson, R. K. Prabhu:
Regression Analysis of Brain Biomechanics Under Uniaxial Deformation. 142-149 - Nandana Prabhu, Deepak Bhoir, Nita Shanbhag, Uma Rao:
Exudate-Based Classification for Detection of Severity of Diabetic Macula Edema. 150-160 - Vibhu Garg, Madhur Bansal, A. Sanjana, Mayank Dave:
Analysis and Detection of Brain Tumor Using U-Net-Based Deep Learning. 161-173 - Krzysztof Michalik, Katarzyna Kucharska:
Implementation of Deep Neural Networks in Facial Emotion Perception in Patients Suffering from Depressive Disorder: Promising Tool in the Diagnostic Process and Treatment Evaluation. 174-184 - Saleh Al-Ardhi, Vijey Thayananthan, Abdullah Basuhail:
Invisibility and Fidelity Vector Map Watermarking Based on Linear Cellular Automata Transform. 185-197 - Hosam Alamleh, Ali Abdullah S. AlQahtani, Dalia Alamleh:
Implementing Variable Power Transmission Patterns for Authentication Purposes. 198-203 - Anthony Demeri, William Diehl, Ahmad Salman:
SADDLE: Secure Aerial Data Delivery with Lightweight Encryption. 204-223 - Robert Heras, Alexander Perez-Pons:
Malware Analysis with Machine Learning for Evaluating the Integrity of Mission Critical Devices. 224-243 - Ovidiu Negoita, Mihai Carabas:
Enhanced Security Using Elasticsearch and Machine Learning. 244-254 - Mohammad Amanul Islam:
Memory Incentive Provenance (MIP) to Secure the Wireless Sensor Data Stream. 255-277 - Muhammed Jassem Al-Muhammed, Ahmad A. Al-Daraiseh, Raed Abu Zitar:
Tightly Close It, Robustly Secure It: Key-Based Lightweight Process for Propping up Encryption Techniques. 278-301 - Bertrand Cambou, Mohammad Mohammadi, Christopher Robert Philabaum, Duane Booher:
Statistical Analysis to Optimize the Generation of Cryptographic Keys from Physical Unclonable Functions. 302-321 - Raghda Fawzey Hriez, Ali Hadi, Jalal Omer Atoum:
Towards an Intelligent Intrusion Detection System: A Proposed Framework. 322-335 - Yuri Bobbert, Nese Ozkanli:
LockChain Technology as One Source of Truth for Cyber, Information Security and Privacy. 336-347 - Julius Ceasar Aguma, Bruce M. McMillin, Amelia Regan:
Introduction of a Hybrid Monitor for Cyber-Physical Systems. 348-360 - Sareh Assiri, Bertrand Cambou, Duane Booher, Mohammad Mohammadinodoushan:
Software Implementation of a SRAM PUF-Based Password Manager. 361-379 - Sunday Alabi, Martin White, Natalia Beloff:
Contactless Palm Vein Authentication Security Technique for Better Adoption of e-Commerce in Developing Countries. 380-390 - Mouhammd Al-Kasassbeh, Mohammad Ali Abbadi, Ahmed M. Al-Bustanji:
LightGBM Algorithm for Malware Detection. 391-403 - Jakub Klemsa, Martin Novotný:
Exploiting Linearity in White-Box AES with Differential Computation Analysis. 404-419 - Meng Huang, Tao Li, Hui Zhao, Xiaojie Liu, Zhan Gao:
Immune-Based Network Dynamic Risk Control Strategy Knowledge Ontology Construction. 420-430 - Ahmad Ghafarian, Deniz Keskin:
Windows 10 Hibernation File Forensics. 431-445 - Pranieth Chandrasekara, Hasini Abeywardana, Sammani Rajapaksha, Sanjeevan Parameshwaran, Kavinga Yapa Abeywardana:
Behavior and Biometrics Based Masquerade Detection Mobile Application. 446-458 - Ammar S. Salman, Odai S. Salman:
Spoofed/Unintentional Fingerprint Detection Using Behavioral Biometric Features. 459-470 - Amari N. Lewis, Amelia C. Regan:
Enabling Paratransit and TNC Services with Blockchain Based Smart Contracts. 471-481 - Neda Shabani, Arslan Munir:
A Review of Cyber Security Issues in Hospitality Industry. 482-493 - Yuxuan Zhu, Bertrand Cambou, David Hély, Sareh Assiri:
Extended Protocol Using Keyless Encryption Based on Memristors. 494-510 - Jason Jaskolka:
Recommendations for Effective Security Assurance of Software-Dependent Systems. 511-531 - Manisha, Nitin Kumar:
On Generating Cancelable Biometric Templates Using Visual Secret Sharing. 532-544 - Naresh Kumar Giri, Arslan Munir, Joonho Kong:
An Integrated Safe and Secure Approach for Authentication and Secret Key Establishment in Automotive Cyber-Physical Systems. 545-559 - Sergei Koltcov, Vera Ignatenko, Sergei Pashakhin:
How Many Clusters? An Entropic Approach to Hierarchical Cluster Analysis. 560-569 - Yojiro Harie, Katsumi Wasaki:
Analysis of Structural Liveness and Boundedness in Weighted Free-Choice Net Based on Circuit Flow Values. 570-580 - James Spooner, Madeline Cheah, Vasile Palade, Stratis Kanarachos, Alireza Daneshkhah:
Classification of a Pedestrian's Behaviour Using Dual Deep Neural Networks. 581-597 - Eva Sciacca, Fabio Vitello, Ugo Becciani, Cristobal Bordiu, Filomena Bufano, Antonio Calanducci, Alessandro Costa, Mario Raciti, Simone Riggi:
Towards Porting Astrophysics Visual Analytics Services in the European Open Science Cloud. 598-606 - Ahmed Imran:
Computer Graphics-Based Analysis of Anterior Cruciate Ligament in a Partially Replaced Knee. 607-612 - Mihai Caramihai, Irina Severin, Ana Maria Bogatu:
An Assessment Algorithm for Evaluating Students Satisfaction in e-Learning Environments: A Case Study. 613-621 - Yevgenia A. Daineko, Nurzhan T. Duzbayev, K. B. Kozhaly, Madina T. Ipalakova, Zh. M. Bekaulova, N. Zh. Nalgozhina, R. N. Sharshova:
The Use of New Technologies in the Organization of the Educational Process. 622-627 - Milena Karova, Ivaylo Penev, Daniel Marinov:
Design and Implementation of Cryptocurrency Price Prediction System. 628-643 - Boris Morose, Sabina Aledort, Gal Zaidman:
Strategic Behavior Discovery of Multi-agent Systems Based on Deep Learning Technique. 644-651 - Nikita A. Andriyanov:
Development of Prediction Methods for Taxi Order Service on the Basis of Intellectual Data Analysis. 652-664 - Rosemary Papa, Karen Moran Jackson, Ric Brown, David Jackson:
Discourse Analysis on Learning Theories and AI. 665-672 - Charles Roberto Telles:
False Asymptotic Instability Behavior at Iterated Functions with Lyapunov Stability in Nonlinear Time Series. 673-693 - Sipovskaya Yana Ivanovna:
The Influence of Methodological Tools on the Diagnosed Level of Intellectual Competence in Older Adolescents. 694-701 - Ali K. Abed, Rami Qahwaji:
The Automated Solar Activity Prediction System (ASAP) Update Based on Optimization of a Machine Learning Approach. 702-717
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.